You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: defender-endpoint/enable-attack-surface-reduction.md
+26-19Lines changed: 26 additions & 19 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -4,8 +4,8 @@ description: Enable attack surface reduction rules to protect your devices from
4
4
ms.service: defender-endpoint
5
5
ms.localizationpriority: medium
6
6
audience: ITPro
7
-
author: batamig
8
-
ms.author: bagol
7
+
author: paulinbar
8
+
ms.author: painbar
9
9
manager: bagol
10
10
ms.subservice: asr
11
11
ms.topic: how-to
@@ -15,7 +15,7 @@ ms.collection:
15
15
- mde-asr
16
16
ms.custom: admindeeplinkDEFENDER
17
17
search.appverid: met150
18
-
ms.date: 06/05/2025
18
+
ms.date: 09/10/2025
19
19
---
20
20
21
21
# Enable attack surface reduction rules
@@ -35,9 +35,9 @@ ms.date: 06/05/2025
35
35
36
36
[Attack surface reduction rules](attack-surface-reduction.md) help prevent actions that malware often abuses to compromise devices and networks.
37
37
38
-
## Requirements
38
+
## Prerequisites
39
39
40
-
Attack surface reduction features across Windows versions
40
+
### Supported operating systems
41
41
42
42
You can set attack surface reduction rules for devices that are running any of the following editions and versions of Windows:
43
43
@@ -53,22 +53,34 @@ You can set attack surface reduction rules for devices that are running any of t
53
53
- Windows Server 2025
54
54
- Azure Stack HCI OS, version 23H2 and later
55
55
56
-
To use the entire feature-set of attack surface reduction rules, you need:
56
+
### Requirements
57
57
58
-
- Microsoft Defender Antivirus as primary antivirus. Microsoft Defender Antivirus can't be running in passive mode or be disabled.
58
+
To use the entire feature-set of attack surface reduction rules:
59
59
60
-
-[Real-time protection](/defender-endpoint/configure-real-time-protection-microsoft-defender-antivirus) to be on
60
+
-Microsoft Defender Antivirus must be set as the primary antivirus. It must not be running in passive mode or be disabled.
61
61
62
-
-[Cloud-Delivery Protection](/windows/security/threat-protection/microsoft-defender-antivirus/enable-cloud-protection-microsoft-defender-antivirus)to be on (some rules require Cloud Protection)
62
+
-[Real-time protection](/defender-endpoint/configure-real-time-protection-microsoft-defender-antivirus)must be on.
-[Cloud-Delivery Protection](/windows/security/threat-protection/microsoft-defender-antivirus/enable-cloud-protection-microsoft-defender-antivirus) must be on (some rules require Cloud Protection).
65
65
66
-
-Microsoft 365 E5 or E3 License
66
+
-You must have [Cloud Protection network connectivity](/defender-endpoint/configure-network-connections-microsoft-defender-antivirus)
67
67
68
-
> [!IMPORTANT]
69
-
> The prerequisites listed in this article are necessary in order for Attack Surface Reduction rules to work properly.
68
+
- Recommended: Microsoft 365 E5 or E3 License
69
+
70
+
Although attack surface reduction rules don't require a [Microsoft 365 E5 license](/microsoft-365/commerce/licenses/e3-extra-features-licenses), it is recommended to use attack surface reduction rules with a Microsoft 365 E5 license (or similar licensing SKU) to take advantage of advanced management capabilities, including monitoring, analytics, and workflows available in Defender for Endpoint, as well as reporting and configuration capabilities in the [Microsoft Defender XDR](https://go.microsoft.com/fwlink/p/?linkid=2077139) portal.
71
+
72
+
If you have another license, such as Windows Professional or Microsoft 365 E3 that doesn't include advanced monitoring and reporting capabilities, you can develop your own monitoring and reporting tools on top of the events that are generated at each endpoint when attack surface reduction rules are triggered (for example, Event Forwarding).
73
+
74
+
To learn more about Windows licensing, see [Windows 10 Licensing](https://www.microsoft.com/licensing/product-licensing/windows10?activetab=windows10-pivot:primaryr5) and get the [Volume Licensing guide for Windows 10](https://www.microsoft.com/en-us/download/details.aspx?id=11091).
70
75
71
-
Although attack surface reduction rules don't require a [Microsoft 365 E5 license](/microsoft-365/commerce/licenses/e3-extra-features-licenses), with Microsoft 365 E5 license, you get advanced management capabilities including monitoring, analytics, and workflows available in Defender for Endpoint, as well as reporting and configuration capabilities in the [Microsoft Defender XDR](https://go.microsoft.com/fwlink/p/?linkid=2077139) portal. These advanced capabilities aren't available with an E3 license, but you can still use Event Viewer to review attack surface reduction rule events.
76
+
> [!WARNING]
77
+
> The following ASR rules are only enforced if Office executables are installed under the system-defined `%ProgramFiles%` or `%ProgramFiles(x86)%` directories (on most systems, `%ProgramFiles%` points to `C:\Program Files`).
78
+
>
79
+
> - Block Office communication applications from creating child processes (26190899-1602-49e8-8b27-eb1d0a1ce869)
80
+
> - Block all Office applications from creating child processes (D4F940AB-401B-4EFC-AADC-AD5F3C50688A)
81
+
> - Block Office applications from injecting code into other processes (75668C1F-73B5-4CF0-BB93-3ECF5CB7CC84)
82
+
>
83
+
>If Office is installed in a custom path outside one of the above-mentioned system-defined directories, these rules won't apply.
72
84
73
85
Each attack surface reduction rule contains one of four settings:
74
86
@@ -77,11 +89,6 @@ Each attack surface reduction rule contains one of four settings:
77
89
-**Audit**: Evaluate how the attack surface reduction rule would impact your organization if enabled
78
90
-**Warn**: Enable the attack surface reduction rule but allow the end user to bypass the block
79
91
80
-
We recommend using attack surface reduction rules with a Microsoft 365 E5 license (or similar licensing SKU) to take advantage of the advanced monitoring and reporting capabilities available in [Microsoft Defender for Endpoint](microsoft-defender-endpoint.md) (Defender for Endpoint). However, if you have another license, such as Windows Professional or Microsoft 365 E3 that doesn't include advanced monitoring and reporting capabilities, you can develop your own monitoring and reporting tools on top of the events that are generated at each endpoint when attack surface reduction rules are triggered (for example, Event Forwarding).
81
-
82
-
> [!TIP]
83
-
> To learn more about Windows licensing, see [Windows 10 Licensing](https://www.microsoft.com/licensing/product-licensing/windows10?activetab=windows10-pivot:primaryr5) and get the [Volume Licensing guide for Windows 10](https://www.microsoft.com/en-us/download/details.aspx?id=11091).
84
-
85
92
You can enable attack surface reduction rules by using any of these methods:
0 commit comments